Nessus Plugin #12123
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
Apache Tomcat source.jsp malformed request information disclosure
- Family:
- CGI abuses
- Category:
- infos
- Copyright:
- This script is Copyright (C) 2004 David Kyger
- Summary:
- Checks for the Tomcat source.jsp malformed request vulnerability
- Version:
- $Revision: 1.3 $
- Cve_id:
- -
- Bugtraq_id:
- 4876
- Xrefs:
- -
- Description:
The source.jsp file, distributed with Apache Tomcat server, will
disclose information when passed a malformed request. As a result,
information such as the web root path and directory listings could
be obtained.
Example: http://target/examples/jsp/source.jsp?? - reveals the web root
http://target/examples/jsp/source.jsp?/jsp/ - reveals the contents of the jsp directory
See also: http://www.securityfocus.com/bid/4876
Solution: Remove default files from the web server
Risk factor : Medium
Generiert am 27.04.2005 um 18:49:54 Uhr.